Free ISSEP Exam Braindumps (page: 9)

Page 8 of 54

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

  1. UDP
  2. SSL
  3. IPSec
  4. HTTP

Answer(s): B



Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented

  1. Configuration verification and audit
  2. Configuration control
  3. Configuration status accounting
  4. Configuration identification

Answer(s): D



What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

  1. Develop DIACAP strategy.
  2. Initiate IA implementation plan.
  3. Conduct validation activity.
  4. Assemble DIACAP team.
  5. Register system with DoD Component IA Program.
  6. Assign IA controls.

Answer(s): A,B,D,E,F



You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems

  1. NIST Special Publication 800-59
  2. NIST Special Publication 800-37
  3. NIST Special Publication 800-60
  4. NIST Special Publication 800-53

Answer(s): B






Post your Comments and Discuss ISC ISSEP exam with other Community members:

ISSEP Discussions & Posts